Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Unit 05 Computers, Society and Law Unit Reference Number K/617/3038 Unit Title Computers, Society and Law  Unit Level 6 Number of Credits 20 Total Qualification Time 200 Mandatory / Optional Mandatory SSAs 06

Computer Science Jan 20, 2022

Unit 05 Computers, Society and Law

Unit Reference Number

K/617/3038

Unit Title

Computers, Society and Law 

Unit Level

6

Number of Credits

20

Total Qualification Time

200

Mandatory / Optional

Mandatory

SSAs

06.1 ICT practitioners

Unit Grading Structure

Pass/Fail 

Unit Aims

The aim of this unit is to develop learners’ ability to deal with work related IT issues that apply beyond the immediate tasks of the Information Technology practitioner, ie ethical, legal and societal considerations. Formal legal requirements and responsibilities of the profession are included, as are the relevant professional codes of conduct. 

 

Learning Outcomes and Assessment Criteria

 

Learning Outcomes- The learner will:

Assessment Criteria- The learner can:

1. Understand ethical concerns relating to Information Technology activities.

1.1 Analyse the types of conflicts of interest for IT professionals.

1.2 Critically evaluate various ethical issues for IT professionals. 

1.3 Identify ethical issue(s) within an IT organisation and recommend solutions.

2. Understand the legislative environment relating to Information Technology activities.

2.1 Critically evaluate the implications of legislation for IT activities.

2.2 Critically evaluate the impact of related legislation on the IT sector.

3. Understand common types of computeroriented crimes.

3.1 Define the main categories of cybercrime. 

3.2 Critically evaluate the major categories of cybercrime.

4. Be able to review security risks in an organisation and design an IT security policy.

4.1 Evaluate various risk assessment procedures.

4.2 Summarise the BS ISO 31000:2009 risk management principles and guidelines.

4.3 Describe how IT security can be aligned with organisational policy. 

4.4 Design and implement an IT security policy for an organisation.

 

 

 

 

Scenario 

 

You have attended an Ethical Hacker forum as a student of OTHM and learnt that as an Information Technology practitioner you have to make a number of ethical, legal and societal judgements.

 

All OTHM students are expected to have a good knowledge of how they can positively contribute to the society. Your tutor will assign you the following tasks that will focus on making you a well-informed IT practitioner.   

Task 1 of 2 – Written Report 

 

You are tasked with producing a written report which includes:

 

Instructions

 

  1. An analysis types of conflicts of interest for IT professionals.
  2. A critical evaluation of various ethical issues for IT professionals.
  3. A clear identification of ethical issue(s) within an IT organisation of your choice and recommend solutions for the organisation.

                                                                                                    (LO1, AC1.1, 1.2, 1.3)

 

  1. A critical evaluation of the implications of legislation for IT activities.
  2. A critical evaluation of the impact of related legislation on the IT sector.

                                                                                                    (LO2, AC 2.1, 2.2)

 

  1. Defining the main categories of cybercrime.
  2. A critical evaluation of the major categories of cybercrime

                                                                                                    (LO3, AC 3.1, 3.2)

  1. A evaluation of various risk assessment procedures. 
  2. A summary of the BS ISO 31000:2009 risk management principles and guidelines.
  3. A description of how IT security can be aligned with organisational policy.

                                                                                               (LO4, AC4.1, 4.2, 4.3)

 

 

Delivery and Submission

 

? 1x Word file (circa 2200 words excluding TOC, diagrams, references and appendices) 

 

 

 

 

 

Task 2 of 2 – Policy document 

 

You are commissioned by the organisation you selected in Task 1 (c) to prepare a policy document. 

 

Instructions

Your document will consist of two parts. 

  1. Design an IT security policy for your chosen organisation.
  2. Implement your IT security policy in your chosen organisation.

(Note: this is a practical task. Theoretical and imaginary answer is not acceptable for this task)

Delivery and Submission

? 1x Word file (circa 800 words excluding TOC, diagrams, references and appendices)

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment